Vulnerabilities > CVE-2012-3979 - Remote Code Execution vulnerability in Mozilla Firefox

047910
CVSS 6.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
mozilla
google
nessus

Summary

Mozilla Firefox before 15.0 on Android does not properly implement unspecified callers of the __android_log_print function, which allows remote attackers to execute arbitrary code via a crafted web page that calls the JavaScript dump function.

Vulnerable Configurations

Part Description Count
Application
Mozilla
200
OS
Google
1

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_FIREFOX-201208-8269.NASL
    descriptionMozillaFirefox was updated to 10.0.7ESR release, fixing a lot of bugs and security problems. The following security issues have been addressed : - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. (MFSA 2012-57) In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products. - Gary Kwong, Christian Holler, Jesse Ruderman, Steve Fink, Bob Clary, Andrew Sutherland, and Jason Smith reported memory safety problems and crashes that affect Firefox 14. (CVE-2012-1971) - Gary Kwong, Christian Holler, Jesse Ruderman, John Schoenick, Vladimir Vukicevic and Daniel Holbert reported memory safety problems and crashes that affect Firefox ESR 10 and Firefox 14. (CVE-2012-1970) - Security researcher Abhishek Arya (Inferno) of Google Chrome Security Team discovered a series of use-after-free issues using the Address Sanitizer tool. Many of these issues are potentially exploitable, allowing for remote code execution. (MFSA 2012-58) o Heap-use-after-free in nsHTMLEditor::CollapseAdjacentTextNodes CVE-2012-1972: o Heap-use-after-free in nsObjectLoadingContent::LoadObject CVE-2012-1973: o Heap-use-after-free in gfxTextRun::CanBreakLineBefore CVE-2012-1974: o Heap-use-after-free in PresShell::CompleteMove CVE-2012-1975 o Heap-use-after-free in nsHTMLSelectElement::SubmitNamesValues CVE-2012-1976: o Heap-use-after-free in MediaStreamGraphThreadRunnable::Run() CVE-2012-3956: o Heap-buffer-overflow in nsBlockFrame::MarkLineDirty CVE-2012-3957: o Heap-use-after-free in nsHTMLEditRules::DeleteNonTableElements CVE-2012-3958: o Heap-use-after-free in nsRangeUpdater::SelAdjDeleteNode CVE-2012-3959: o Heap-use-after-free in mozSpellChecker::SetCurrentDictionary CVE-2012-3960: o Heap-use-after-free in RangeData::~RangeData CVE-2012-3961 o Bad iterator in text runs CVE-2012-3962 o use after free in js::gc::MapAllocToTraceKind CVE-2012-3963 o Heap-use-after-free READ 8 in gfxTextRun::GetUserData CVE-2012-3964: * MFSA 2012-59 / CVE-2012-1956: Security researcher Mariusz Mlynski reported that it is possible to shadow the location object using Object.defineProperty. This could be used to confuse the current location to plugins, allowing for possible cross-site scripting (XSS) attacks. - Security researcher Mariusz Mlynski reported that when a page opens a new tab, a subsequent window can then be opened that can be navigated to about:newtab, a chrome privileged page. Once about:newtab is loaded, the special context can potentially be used to escalate privilege, allowing for arbitrary code execution on the local system in a maliciously crafted attack. (MFSA 2012-60 / CVE-2012-3965) - Security researcher Frederic Hoguin reported two related issues with the decoding of bitmap (.BMP) format images embedded in icon (.ICO) format files. When processing a negative
    last seen2020-06-05
    modified2012-09-14
    plugin id62096
    published2012-09-14
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/62096
    titleSuSE 10 Security Update : Mozilla Firefox (ZYPP Patch Number 8269)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The text description of this plugin is (C) Novell, Inc.
    #
    
    if (NASL_LEVEL < 3000) exit(0);
    
    include("compat.inc");
    
    if (description)
    {
      script_id(62096);
      script_version("1.5");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2012-1956", "CVE-2012-1970", "CVE-2012-1971", "CVE-2012-1972", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-1975", "CVE-2012-1976", "CVE-2012-3956", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-3959", "CVE-2012-3960", "CVE-2012-3961", "CVE-2012-3962", "CVE-2012-3963", "CVE-2012-3964", "CVE-2012-3965", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3968", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3971", "CVE-2012-3972", "CVE-2012-3973", "CVE-2012-3974", "CVE-2012-3975", "CVE-2012-3976", "CVE-2012-3978", "CVE-2012-3979", "CVE-2012-3980");
    
      script_name(english:"SuSE 10 Security Update : Mozilla Firefox (ZYPP Patch Number 8269)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SuSE 10 host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "MozillaFirefox was updated to 10.0.7ESR release, fixing a lot of bugs
    and security problems.
    
    The following security issues have been addressed :
    
      - Mozilla developers identified and fixed several memory
        safety bugs in the browser engine used in Firefox and
        other Mozilla-based products. Some of these bugs showed
        evidence of memory corruption under certain
        circumstances, and we presume that with enough effort at
        least some of these could be exploited to run arbitrary
        code. (MFSA 2012-57)
    
        In general these flaws cannot be exploited through email
        in the Thunderbird and SeaMonkey products because
        scripting is disabled, but are potentially a risk in
        browser or browser-like contexts in those products.
    
      - Gary Kwong, Christian Holler, Jesse Ruderman, Steve
        Fink, Bob Clary, Andrew Sutherland, and Jason Smith
        reported memory safety problems and crashes that affect
        Firefox 14. (CVE-2012-1971)
    
      - Gary Kwong, Christian Holler, Jesse Ruderman, John
        Schoenick, Vladimir Vukicevic and Daniel Holbert
        reported memory safety problems and crashes that affect
        Firefox ESR 10 and Firefox 14. (CVE-2012-1970)
    
      - Security researcher Abhishek Arya (Inferno) of Google
        Chrome Security Team discovered a series of
        use-after-free issues using the Address Sanitizer tool.
        Many of these issues are potentially exploitable,
        allowing for remote code execution. (MFSA 2012-58)
    
        o Heap-use-after-free in
        nsHTMLEditor::CollapseAdjacentTextNodes CVE-2012-1972: o
        Heap-use-after-free in
        nsObjectLoadingContent::LoadObject CVE-2012-1973: o
        Heap-use-after-free in gfxTextRun::CanBreakLineBefore
        CVE-2012-1974: o Heap-use-after-free in
        PresShell::CompleteMove CVE-2012-1975 o
        Heap-use-after-free in
        nsHTMLSelectElement::SubmitNamesValues CVE-2012-1976: o
        Heap-use-after-free in
        MediaStreamGraphThreadRunnable::Run() CVE-2012-3956: o
        Heap-buffer-overflow in nsBlockFrame::MarkLineDirty
        CVE-2012-3957: o Heap-use-after-free in
        nsHTMLEditRules::DeleteNonTableElements CVE-2012-3958: o
        Heap-use-after-free in nsRangeUpdater::SelAdjDeleteNode
        CVE-2012-3959: o Heap-use-after-free in
        mozSpellChecker::SetCurrentDictionary CVE-2012-3960: o
        Heap-use-after-free in RangeData::~RangeData
        CVE-2012-3961 o Bad iterator in text runs CVE-2012-3962
        o use after free in js::gc::MapAllocToTraceKind
        CVE-2012-3963 o Heap-use-after-free READ 8 in
        gfxTextRun::GetUserData CVE-2012-3964: * MFSA 2012-59 /
        CVE-2012-1956: Security researcher Mariusz Mlynski
        reported that it is possible to shadow the location
        object using Object.defineProperty. This could be used
        to confuse the current location to plugins, allowing for
        possible cross-site scripting (XSS) attacks.
    
      - Security researcher Mariusz Mlynski reported that when a
        page opens a new tab, a subsequent window can then be
        opened that can be navigated to about:newtab, a chrome
        privileged page. Once about:newtab is loaded, the
        special context can potentially be used to escalate
        privilege, allowing for arbitrary code execution on the
        local system in a maliciously crafted attack. (MFSA
        2012-60 / CVE-2012-3965)
    
      - Security researcher Frederic Hoguin reported two related
        issues with the decoding of bitmap (.BMP) format images
        embedded in icon (.ICO) format files. When processing a
        negative 'height' header value for the bitmap image, a
        memory corruption can be induced, allowing an attacker
        to write random memory and cause a crash. This crash may
        be potentially exploitable. (MFSA 2012-61 /
        CVE-2012-3966)
    
      - Security researcher miaubiz used the Address Sanitizer
        tool to discover two WebGL issues. The first issue is a
        use-after-free when WebGL shaders are called after being
        destroyed. The second issue exposes a problem with Mesa
        drivers on Linux, leading to a potentially exploitable
        crash. (MFSA 2012-62)
    
        o
    
        use after free, webgl fragment shader deleted by
        accessor CVE-2012-3968: o
    
        stack scribbling with 4-byte values choosable among a
        few values, when using more than 16 sampler uniforms, on
        Mesa, with all drivers CVE-2012-3967
    
      - Security researcher Arthur Gerkis used the Address
        Sanitizer tool to find two issues involving Scalable
        Vector Graphics (SVG) files. The first issue is a buffer
        overflow in Gecko's SVG filter code when the sum of two
        values is too large to be stored as a signed 32-bit
        integer, causing the function to write past the end of
        an array. The second issue is a use-after-free when an
        element with a 'requiredFeatures' attribute is moved
        between documents. In that situation, the internal
        representation of the 'requiredFeatures' value could be
        freed prematurely. Both issues are potentially
        exploitable. (MFSA 2012-63)
    
        o
    
        Heap-buffer-overflow in nsSVGFEMorphologyElement::Filter
        CVE-2012-3969: o
    
        Heap-use-after-free in nsTArray_base::Length()
        CVE-2012-3970
    
      - Using the Address Sanitizer tool, Mozilla security
        researcher Christoph Diehl discovered two memory
        corruption issues involving the Graphite 2 library used
        in Mozilla products. Both of these issues can cause a
        potentially exploitable crash. These problems were fixed
        in the Graphite 2 library, which has been updated for
        Mozilla products. (MFSA 2012-64 / CVE-2012-3971)
    
      - Security research Nicolas Gregoire used the Address
        Sanitizer tool to discover an out-of-bounds read in the
        format-number feature of XSLT, which can cause
        inaccurate formatting of numbers and information
        leakage. This is not directly exploitable. (MFSA 2012-65
        / CVE-2012-3972)
    
      - Mozilla security researcher Mark Goodwin discovered an
        issue with the Firefox developer tools' debugger. If
        remote debugging is disabled, but the experimental
        HTTPMonitor extension has been installed and enabled, a
        remote user can connect to and use the remote debugging
        service through the port used by HTTPMonitor. A
        remote-enabled flag has been added to resolve this
        problem and close the port unless debugging is
        explicitly enabled. (MFSA 2012-66 / CVE-2012-3973)
    
      - Security researcher Masato Kinugawa reported that if a
        crafted executable is placed in the root partition on a
        Windows file system, the Firefox and Thunderbird
        installer will launch this program after a standard
        installation instead of Firefox or Thunderbird, running
        this program with the user's privileges. (MFSA 2012-67 /
        CVE-2012-3974)
    
      - Security researcher vsemozhetbyt reported that when the
        DOMParser is used to parse text/html data in a Firefox
        extension, linked resources within this HTML data will
        be loaded. If the data being parsed in the extension is
        untrusted, it could lead to information leakage and can
        potentially be combined with other attacks to become
        exploitable. (MFSA 2012-68 / CVE-2012-3975)
    
      - Security researcher Mark Poticha reported an issue where
        incorrect SSL certificate information can be displayed
        on the addressbar, showing the SSL data for a previous
        site while another has been loaded. This is caused by
        two onLocationChange events being fired out of the
        expected order, leading to the displayed certificate
        data to not be updated. This can be used for phishing
        attacks by allowing the user to input form or other data
        on a newer, attacking, site while the credentials of an
        older site appear on the addressbar. (MFSA 2012-69 /
        CVE-2012-3976)
    
      - Mozilla security researcher moz_bug_r_a4 reported that
        certain security checks in the location object can be
        bypassed if chrome code is called content in a specific
        manner. This allowed for the loading of restricted
        content. This can be combined with other issues to
        become potentially exploitable. (MFSA 2012-70 /
        CVE-2012-3978)
    
      - Mozilla developer Blake Kaplan reported that
        __android_log_print is called insecurely in places. If a
        malicious web page used a dump() statement with a
        specially crafted string, it can trigger a potentially
        exploitable crash. (MFSA 2012-71 / CVE-2012-3979)
    
        This vulnerability only affects Firefox for Android.
    
      - Security researcher Colby Russell discovered that eval
        in the web console can execute injected code with chrome
        privileges, leading to the running of malicious code in
        a privileged context. This allows for arbitrary code
        execution through a malicious web page if the web
        console is invoked by the user. (MFSA 2012-72 /
        CVE-2012-3980)"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-57.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-57/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-58/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-59.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-59/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-60.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-60/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-61.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-61/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-62.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-62/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-63.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-63/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-64.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-64/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-65.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-65/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-66.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-66/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-67.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-67/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-68.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-68/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-69.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-69/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-70.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-70/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-71.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-71/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-72.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-72/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-1956.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-1970.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-1971.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-1972.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-1973.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-1974.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-1975.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-1976.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3956.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3957.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3958.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3959.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3960.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3961.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3962.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3963.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3964.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3965.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3966.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3967.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3968.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3969.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3970.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3971.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3972.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3973.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3974.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3975.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3976.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3978.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3979.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3980.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply ZYPP patch number 8269.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/08/29");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/08/30");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/09/14");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled.");
    if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE.");
    if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages.");
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) exit(1, "Failed to determine the architecture type.");
    if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 10 on the '"+cpu+"' architecture have not been implemented.");
    
    
    flag = 0;
    if (rpm_check(release:"SLED10", sp:4, reference:"MozillaFirefox-10.0.7-0.5.1")) flag++;
    if (rpm_check(release:"SLED10", sp:4, reference:"MozillaFirefox-branding-SLED-7-0.8.31")) flag++;
    if (rpm_check(release:"SLED10", sp:4, reference:"MozillaFirefox-translations-10.0.7-0.5.1")) flag++;
    if (rpm_check(release:"SLED10", sp:4, reference:"firefox3-cairo-1.2.4-0.8.1")) flag++;
    if (rpm_check(release:"SLED10", sp:4, reference:"mozilla-nspr-4.9.2-0.9.1")) flag++;
    if (rpm_check(release:"SLED10", sp:4, reference:"mozilla-nspr-devel-4.9.2-0.9.1")) flag++;
    if (rpm_check(release:"SLED10", sp:4, reference:"mozilla-nss-3.13.6-0.8.1")) flag++;
    if (rpm_check(release:"SLED10", sp:4, reference:"mozilla-nss-devel-3.13.6-0.8.1")) flag++;
    if (rpm_check(release:"SLED10", sp:4, reference:"mozilla-nss-tools-3.13.6-0.8.1")) flag++;
    if (rpm_check(release:"SLED10", sp:4, cpu:"x86_64", reference:"firefox3-cairo-32bit-1.2.4-0.8.1")) flag++;
    if (rpm_check(release:"SLED10", sp:4, cpu:"x86_64", reference:"mozilla-nspr-32bit-4.9.2-0.9.1")) flag++;
    if (rpm_check(release:"SLED10", sp:4, cpu:"x86_64", reference:"mozilla-nss-32bit-3.13.6-0.8.1")) flag++;
    if (rpm_check(release:"SLES10", sp:4, reference:"MozillaFirefox-10.0.7-0.5.1")) flag++;
    if (rpm_check(release:"SLES10", sp:4, reference:"MozillaFirefox-branding-SLED-7-0.8.31")) flag++;
    if (rpm_check(release:"SLES10", sp:4, reference:"MozillaFirefox-translations-10.0.7-0.5.1")) flag++;
    if (rpm_check(release:"SLES10", sp:4, reference:"firefox3-cairo-1.2.4-0.8.1")) flag++;
    if (rpm_check(release:"SLES10", sp:4, reference:"mozilla-nspr-4.9.2-0.9.1")) flag++;
    if (rpm_check(release:"SLES10", sp:4, reference:"mozilla-nspr-devel-4.9.2-0.9.1")) flag++;
    if (rpm_check(release:"SLES10", sp:4, reference:"mozilla-nss-3.13.6-0.8.1")) flag++;
    if (rpm_check(release:"SLES10", sp:4, reference:"mozilla-nss-devel-3.13.6-0.8.1")) flag++;
    if (rpm_check(release:"SLES10", sp:4, reference:"mozilla-nss-tools-3.13.6-0.8.1")) flag++;
    if (rpm_check(release:"SLES10", sp:4, cpu:"x86_64", reference:"firefox3-cairo-32bit-1.2.4-0.8.1")) flag++;
    if (rpm_check(release:"SLES10", sp:4, cpu:"x86_64", reference:"mozilla-nspr-32bit-4.9.2-0.9.1")) flag++;
    if (rpm_check(release:"SLES10", sp:4, cpu:"x86_64", reference:"mozilla-nss-32bit-3.13.6-0.8.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else exit(0, "The host is not affected.");
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_2B8CAD90F28911E1A21514DAE9EBCF89.NASL
    descriptionThe Mozilla Project reports : MFSA 2012-57 Miscellaneous memory safety hazards (rv:15.0/ rv:10.0.7) MFSA 2012-58 Use-after-free issues found using Address Sanitizer MFSA 2012-59 Location object can be shadowed using Object.defineProperty MFSA 2012-60 Escalation of privilege through about:newtab MFSA 2012-61 Memory corruption with bitmap format images with negative height MFSA 2012-62 WebGL use-after-free and memory corruption MFSA 2012-63 SVG buffer overflow and use-after-free issues MFSA 2012-64 Graphite 2 memory corruption MFSA 2012-65 Out-of-bounds read in format-number in XSLT MFSA 2012-66 HTTPMonitor extension allows for remote debugging without explicit activation MFSA 2012-67 Installer will launch incorrect executable following new installation MFSA 2012-68 DOMParser loads linked resources in extensions when parsing text/html MFSA 2012-69 Incorrect site SSL certificate data display MFSA 2012-70 Location object security checks bypassed by chrome code MFSA 2012-71 Insecure use of __android_log_print MFSA 2012-72 Web console eval capable of executing chrome-privileged code
    last seen2020-06-01
    modified2020-06-02
    plugin id61741
    published2012-08-31
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61741
    titleFreeBSD : mozilla -- multiple vulnerabilities (2b8cad90-f289-11e1-a215-14dae9ebcf89)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from the FreeBSD VuXML database :
    #
    # Copyright 2003-2019 Jacques Vidrine and contributors
    #
    # Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
    # HTML, PDF, PostScript, RTF and so forth) with or without modification,
    # are permitted provided that the following conditions are met:
    # 1. Redistributions of source code (VuXML) must retain the above
    #    copyright notice, this list of conditions and the following
    #    disclaimer as the first lines of this file unmodified.
    # 2. Redistributions in compiled form (transformed to other DTDs,
    #    published online in any format, converted to PDF, PostScript,
    #    RTF and other formats) must reproduce the above copyright
    #    notice, this list of conditions and the following disclaimer
    #    in the documentation and/or other materials provided with the
    #    distribution.
    # 
    # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
    # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
    # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
    # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
    # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
    # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
    # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
    # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
    # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
    # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
    # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(61741);
      script_version("1.9");
      script_cvs_date("Date: 2019/07/10 16:04:13");
    
      script_cve_id("CVE-2012-1956", "CVE-2012-1970", "CVE-2012-1971", "CVE-2012-1972", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-1975", "CVE-2012-1976", "CVE-2012-3956", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-3959", "CVE-2012-3960", "CVE-2012-3961", "CVE-2012-3962", "CVE-2012-3963", "CVE-2012-3964", "CVE-2012-3965", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3968", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3971", "CVE-2012-3972", "CVE-2012-3973", "CVE-2012-3974", "CVE-2012-3975", "CVE-2012-3976", "CVE-2012-3978", "CVE-2012-3979", "CVE-2012-3980");
    
      script_name(english:"FreeBSD : mozilla -- multiple vulnerabilities (2b8cad90-f289-11e1-a215-14dae9ebcf89)");
      script_summary(english:"Checks for updated packages in pkg_info output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote FreeBSD host is missing one or more security-related
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The Mozilla Project reports :
    
    MFSA 2012-57 Miscellaneous memory safety hazards (rv:15.0/ rv:10.0.7)
    
    MFSA 2012-58 Use-after-free issues found using Address Sanitizer
    
    MFSA 2012-59 Location object can be shadowed using
    Object.defineProperty
    
    MFSA 2012-60 Escalation of privilege through about:newtab
    
    MFSA 2012-61 Memory corruption with bitmap format images with negative
    height
    
    MFSA 2012-62 WebGL use-after-free and memory corruption
    
    MFSA 2012-63 SVG buffer overflow and use-after-free issues
    
    MFSA 2012-64 Graphite 2 memory corruption
    
    MFSA 2012-65 Out-of-bounds read in format-number in XSLT
    
    MFSA 2012-66 HTTPMonitor extension allows for remote debugging without
    explicit activation
    
    MFSA 2012-67 Installer will launch incorrect executable following new
    installation
    
    MFSA 2012-68 DOMParser loads linked resources in extensions when
    parsing text/html
    
    MFSA 2012-69 Incorrect site SSL certificate data display
    
    MFSA 2012-70 Location object security checks bypassed by chrome code
    
    MFSA 2012-71 Insecure use of __android_log_print
    
    MFSA 2012-72 Web console eval capable of executing chrome-privileged
    code"
      );
      # http://www.mozilla.org/security/known-vulnerabilities/
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/known-vulnerabilities/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-57.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-57/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-58/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-59.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-59/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-60.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-60/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-61.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-61/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-62.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-62/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-63.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-63/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-64.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-64/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-65.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-65/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-66.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-66/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-67.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-67/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-68.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-68/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-69.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-69/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-70.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-70/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-71.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-71/"
      );
      # http://www.mozilla.org/security/announce/2012/mfsa2012-72.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.mozilla.org/en-US/security/advisories/mfsa2012-72/"
      );
      # https://vuxml.freebsd.org/freebsd/2b8cad90-f289-11e1-a215-14dae9ebcf89.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?266b99d3"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:firefox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:libxul");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:linux-firefox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:linux-seamonkey");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:linux-thunderbird");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:seamonkey");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:thunderbird");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/08/28");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/08/30");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/31");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"FreeBSD Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("freebsd_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
    if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (pkg_test(save_report:TRUE, pkg:"firefox>11.0,1<15.0,1")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"firefox<10.0.7,1")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"linux-firefox<10.0.7,1")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"linux-seamonkey<2.12")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"linux-thunderbird<10.0.7")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"seamonkey<2.12")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"thunderbird>11.0<15.0")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"thunderbird<10.0.7")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"libxul>1.9.2.*<10.0.7")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_FIREFOX-201208-120831.NASL
    descriptionMozilla Firefox was updated to 10.0.7ESR release, fixing a lot of bugs and security problems. The following security issues have been addressed : - Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. (MFSA 2012-57) In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products. - Gary Kwong, Christian Holler, Jesse Ruderman, Steve Fink, Bob Clary, Andrew Sutherland, and Jason Smith reported memory safety problems and crashes that affect Firefox 14. (CVE-2012-1971) - Gary Kwong, Christian Holler, Jesse Ruderman, John Schoenick, Vladimir Vukicevic and Daniel Holbert reported memory safety problems and crashes that affect Firefox ESR 10 and Firefox 14. (CVE-2012-1970) - Security researcher Abhishek Arya (Inferno) of Google Chrome Security Team discovered a series of use-after-free issues using the Address Sanitizer tool. Many of these issues are potentially exploitable, allowing for remote code execution. (MFSA 2012-58) - Heap-use-after-free in nsHTMLEditor::CollapseAdjacentTextNodes. (CVE-2012-1972) - Heap-use-after-free in nsObjectLoadingContent::LoadObject. (CVE-2012-1973) - Heap-use-after-free in gfxTextRun::CanBreakLineBefore. (CVE-2012-1974) - Heap-use-after-free in PresShell::CompleteMove. (CVE-2012-1975) - Heap-use-after-free in nsHTMLSelectElement::SubmitNamesValues. (CVE-2012-1976) - Heap-use-after-free in MediaStreamGraphThreadRunnable::Run(). (CVE-2012-3956) - Heap-buffer-overflow in nsBlockFrame::MarkLineDirty. (CVE-2012-3957) - Heap-use-after-free in nsHTMLEditRules::DeleteNonTableElements. (CVE-2012-3958) - Heap-use-after-free in nsRangeUpdater::SelAdjDeleteNode. (CVE-2012-3959) - Heap-use-after-free in mozSpellChecker::SetCurrentDictionary. (CVE-2012-3960) - Heap-use-after-free in RangeData::~RangeData. (CVE-2012-3961) - Bad iterator in text runs. (CVE-2012-3962) - use after free in js::gc::MapAllocToTraceKind. (CVE-2012-3963) - Heap-use-after-free READ 8 in gfxTextRun::GetUserData. (CVE-2012-3964) - Security researcher Mariusz Mlynski reported that it is possible to shadow the location object using Object.defineProperty. This could be used to confuse the current location to plugins, allowing for possible cross-site scripting (XSS) attacks. (MFSA 2012-59 / CVE-2012-1956) - Security researcher Mariusz Mlynski reported that when a page opens a new tab, a subsequent window can then be opened that can be navigated to about:newtab, a chrome privileged page. Once about:newtab is loaded, the special context can potentially be used to escalate privilege, allowing for arbitrary code execution on the local system in a maliciously crafted attack. (MFSA 2012-60 / CVE-2012-3965) - Security researcher Frederic Hoguin reported two related issues with the decoding of bitmap (.BMP) format images embedded in icon (.ICO) format files. When processing a negative
    last seen2020-06-05
    modified2013-01-25
    plugin id64132
    published2013-01-25
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64132
    titleSuSE 11.2 Security Update : Mozilla Firefox (SAT Patch Number 6763)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from SuSE 11 update information. The text itself is
    # copyright (C) Novell, Inc.
    #
    
    if (NASL_LEVEL < 3000) exit(0);
    
    include("compat.inc");
    
    if (description)
    {
      script_id(64132);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2012-1956", "CVE-2012-1970", "CVE-2012-1971", "CVE-2012-1972", "CVE-2012-1973", "CVE-2012-1974", "CVE-2012-1975", "CVE-2012-1976", "CVE-2012-3956", "CVE-2012-3957", "CVE-2012-3958", "CVE-2012-3959", "CVE-2012-3960", "CVE-2012-3961", "CVE-2012-3962", "CVE-2012-3963", "CVE-2012-3964", "CVE-2012-3965", "CVE-2012-3966", "CVE-2012-3967", "CVE-2012-3968", "CVE-2012-3969", "CVE-2012-3970", "CVE-2012-3971", "CVE-2012-3972", "CVE-2012-3973", "CVE-2012-3974", "CVE-2012-3975", "CVE-2012-3976", "CVE-2012-3978", "CVE-2012-3979", "CVE-2012-3980");
    
      script_name(english:"SuSE 11.2 Security Update : Mozilla Firefox (SAT Patch Number 6763)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SuSE 11 host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Mozilla Firefox was updated to 10.0.7ESR release, fixing a lot of bugs
    and security problems.
    
    The following security issues have been addressed :
    
      - Mozilla developers identified and fixed several memory
        safety bugs in the browser engine used in Firefox and
        other Mozilla-based products. Some of these bugs showed
        evidence of memory corruption under certain
        circumstances, and we presume that with enough effort at
        least some of these could be exploited to run arbitrary
        code. (MFSA 2012-57)
    
        In general these flaws cannot be exploited through email
        in the Thunderbird and SeaMonkey products because
        scripting is disabled, but are potentially a risk in
        browser or browser-like contexts in those products.
    
      - Gary Kwong, Christian Holler, Jesse Ruderman, Steve
        Fink, Bob Clary, Andrew Sutherland, and Jason Smith
        reported memory safety problems and crashes that affect
        Firefox 14. (CVE-2012-1971)
    
      - Gary Kwong, Christian Holler, Jesse Ruderman, John
        Schoenick, Vladimir Vukicevic and Daniel Holbert
        reported memory safety problems and crashes that affect
        Firefox ESR 10 and Firefox 14. (CVE-2012-1970)
    
      - Security researcher Abhishek Arya (Inferno) of Google
        Chrome Security Team discovered a series of
        use-after-free issues using the Address Sanitizer tool.
        Many of these issues are potentially exploitable,
        allowing for remote code execution. (MFSA 2012-58)
    
      - Heap-use-after-free in
        nsHTMLEditor::CollapseAdjacentTextNodes. (CVE-2012-1972)
    
      - Heap-use-after-free in
        nsObjectLoadingContent::LoadObject. (CVE-2012-1973)
    
      - Heap-use-after-free in gfxTextRun::CanBreakLineBefore.
        (CVE-2012-1974)
    
      - Heap-use-after-free in PresShell::CompleteMove.
        (CVE-2012-1975)
    
      - Heap-use-after-free in
        nsHTMLSelectElement::SubmitNamesValues. (CVE-2012-1976)
    
      - Heap-use-after-free in
        MediaStreamGraphThreadRunnable::Run(). (CVE-2012-3956)
    
      - Heap-buffer-overflow in nsBlockFrame::MarkLineDirty.
        (CVE-2012-3957)
    
      - Heap-use-after-free in
        nsHTMLEditRules::DeleteNonTableElements. (CVE-2012-3958)
    
      - Heap-use-after-free in nsRangeUpdater::SelAdjDeleteNode.
        (CVE-2012-3959)
    
      - Heap-use-after-free in
        mozSpellChecker::SetCurrentDictionary. (CVE-2012-3960)
    
      - Heap-use-after-free in RangeData::~RangeData.
        (CVE-2012-3961)
    
      - Bad iterator in text runs. (CVE-2012-3962)
    
      - use after free in js::gc::MapAllocToTraceKind.
        (CVE-2012-3963)
    
      - Heap-use-after-free READ 8 in gfxTextRun::GetUserData.
        (CVE-2012-3964)
    
      - Security researcher Mariusz Mlynski reported that it is
        possible to shadow the location object using
        Object.defineProperty. This could be used to confuse the
        current location to plugins, allowing for possible
        cross-site scripting (XSS) attacks. (MFSA 2012-59 /
        CVE-2012-1956)
    
      - Security researcher Mariusz Mlynski reported that when a
        page opens a new tab, a subsequent window can then be
        opened that can be navigated to about:newtab, a chrome
        privileged page. Once about:newtab is loaded, the
        special context can potentially be used to escalate
        privilege, allowing for arbitrary code execution on the
        local system in a maliciously crafted attack. (MFSA
        2012-60 / CVE-2012-3965)
    
      - Security researcher Frederic Hoguin reported two related
        issues with the decoding of bitmap (.BMP) format images
        embedded in icon (.ICO) format files. When processing a
        negative 'height' header value for the bitmap image, a
        memory corruption can be induced, allowing an attacker
        to write random memory and cause a crash. This crash may
        be potentially exploitable. (MFSA 2012-61 /
        CVE-2012-3966)
    
      - Security researcher miaubiz used the Address Sanitizer
        tool to discover two WebGL issues. The first issue is a
        use-after-free when WebGL shaders are called after being
        destroyed. The second issue exposes a problem with Mesa
        drivers on Linux, leading to a potentially exploitable
        crash. (MFSA 2012-62)
    
      - use after free, webgl fragment shader deleted by
        accessor. (CVE-2012-3968)
    
      - stack scribbling with 4-byte values choosable among a
        few values, when using more than 16 sampler uniforms, on
        Mesa, with all drivers CVE-2012-3967
    
      - Security researcher Arthur Gerkis used the Address
        Sanitizer tool to find two issues involving Scalable
        Vector Graphics (SVG) files. The first issue is a buffer
        overflow in Gecko's SVG filter code when the sum of two
        values is too large to be stored as a signed 32-bit
        integer, causing the function to write past the end of
        an array. The second issue is a use-after-free when an
        element with a 'requiredFeatures' attribute is moved
        between documents. In that situation, the internal
        representation of the 'requiredFeatures' value could be
        freed prematurely. Both issues are potentially
        exploitable. (MFSA 2012-63)
    
      - Heap-buffer-overflow in
        nsSVGFEMorphologyElement::Filter. (CVE-2012-3969)
    
      - Heap-use-after-free in nsTArray_base::Length().
        (CVE-2012-3970)
    
      - Using the Address Sanitizer tool, Mozilla security
        researcher Christoph Diehl discovered two memory
        corruption issues involving the Graphite 2 library used
        in Mozilla products. Both of these issues can cause a
        potentially exploitable crash. These problems were fixed
        in the Graphite 2 library, which has been updated for
        Mozilla products. (MFSA 2012-64 / CVE-2012-3971)
    
      - Security research Nicolas Gregoire used the Address
        Sanitizer tool to discover an out-of-bounds read in the
        format-number feature of XSLT, which can cause
        inaccurate formatting of numbers and information
        leakage. This is not directly exploitable. (MFSA 2012-65
        / CVE-2012-3972)
    
      - Mozilla security researcher Mark Goodwin discovered an
        issue with the Firefox developer tools' debugger. If
        remote debugging is disabled, but the experimental
        HTTPMonitor extension has been installed and enabled, a
        remote user can connect to and use the remote debugging
        service through the port used by HTTPMonitor. A
        remote-enabled flag has been added to resolve this
        problem and close the port unless debugging is
        explicitly enabled. (MFSA 2012-66 / CVE-2012-3973)
    
      - Security researcher Masato Kinugawa reported that if a
        crafted executable is placed in the root partition on a
        Windows file system, the Firefox and Thunderbird
        installer will launch this program after a standard
        installation instead of Firefox or Thunderbird, running
        this program with the user's privileges. (MFSA 2012-67 /
        CVE-2012-3974)
    
      - Security researcher vsemozhetbyt reported that when the
        DOMParser is used to parse text/html data in a Firefox
        extension, linked resources within this HTML data will
        be loaded. If the data being parsed in the extension is
        untrusted, it could lead to information leakage and can
        potentially be combined with other attacks to become
        exploitable. (MFSA 2012-68 / CVE-2012-3975)
    
      - Security researcher Mark Poticha reported an issue where
        incorrect SSL certificate information can be displayed
        on the addressbar, showing the SSL data for a previous
        site while another has been loaded. This is caused by
        two onLocationChange events being fired out of the
        expected order, leading to the displayed certificate
        data to not be updated. This can be used for phishing
        attacks by allowing the user to input form or other data
        on a newer, attacking, site while the credentials of an
        older site appear on the addressbar. (MFSA 2012-69 /
        CVE-2012-3976)
    
      - Mozilla security researcher moz_bug_r_a4 reported that
        certain security checks in the location object can be
        bypassed if chrome code is called content in a specific
        manner. This allowed for the loading of restricted
        content. This can be combined with other issues to
        become potentially exploitable. (MFSA 2012-70 /
        CVE-2012-3978)
    
      - Mozilla developer Blake Kaplan reported that
        __android_log_print is called insecurely in places. If a
        malicious web page used a dump() statement with a
        specially crafted string, it can trigger a potentially
        exploitable crash. (MFSA 2012-71 / CVE-2012-3979)
    
        This vulnerability only affects Firefox for Android.
    
      - Security researcher Colby Russell discovered that eval
        in the web console can execute injected code with chrome
        privileges, leading to the running of malicious code in
        a privileged context. This allows for arbitrary code
        execution through a malicious web page if the web
        console is invoked by the user. (MFSA 2012-72 /
        CVE-2012-3980)"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/2012/mfsa2012-57.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/2012/mfsa2012-58.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/2012/mfsa2012-59.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/2012/mfsa2012-60.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/2012/mfsa2012-61.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/2012/mfsa2012-62.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/2012/mfsa2012-63.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/2012/mfsa2012-64.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/2012/mfsa2012-65.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/2012/mfsa2012-66.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/2012/mfsa2012-67.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/2012/mfsa2012-68.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/2012/mfsa2012-69.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/2012/mfsa2012-70.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/2012/mfsa2012-71.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.mozilla.org/security/announce/2012/mfsa2012-72.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=777588"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-1956.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-1970.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-1971.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-1972.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-1973.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-1974.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-1975.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-1976.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3956.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3957.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3958.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3959.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3960.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3961.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3962.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3963.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3964.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3965.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3966.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3967.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3968.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3969.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3970.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3971.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3972.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3973.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3974.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3975.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3976.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3978.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3979.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2012-3980.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply SAT patch number 6763.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:MozillaFirefox");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:MozillaFirefox-branding-SLED");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:MozillaFirefox-translations");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libfreebl3");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libfreebl3-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:mozilla-nspr");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:mozilla-nspr-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:mozilla-nss");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:mozilla-nss-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:mozilla-nss-tools");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2012/08/31");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/01/25");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2020 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)11") audit(AUDIT_OS_NOT, "SuSE 11");
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SuSE 11", cpu);
    
    pl = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(pl) || int(pl) != 2) audit(AUDIT_OS_NOT, "SuSE 11.2");
    
    
    flag = 0;
    if (rpm_check(release:"SLED11", sp:2, cpu:"i586", reference:"MozillaFirefox-10.0.7-0.3.1")) flag++;
    if (rpm_check(release:"SLED11", sp:2, cpu:"i586", reference:"MozillaFirefox-branding-SLED-7-0.6.7.80")) flag++;
    if (rpm_check(release:"SLED11", sp:2, cpu:"i586", reference:"MozillaFirefox-translations-10.0.7-0.3.1")) flag++;
    if (rpm_check(release:"SLED11", sp:2, cpu:"i586", reference:"libfreebl3-3.13.6-0.5.1")) flag++;
    if (rpm_check(release:"SLED11", sp:2, cpu:"i586", reference:"mozilla-nspr-4.9.2-0.6.1")) flag++;
    if (rpm_check(release:"SLED11", sp:2, cpu:"i586", reference:"mozilla-nss-3.13.6-0.5.1")) flag++;
    if (rpm_check(release:"SLED11", sp:2, cpu:"i586", reference:"mozilla-nss-tools-3.13.6-0.5.1")) flag++;
    if (rpm_check(release:"SLED11", sp:2, cpu:"x86_64", reference:"MozillaFirefox-10.0.7-0.3.1")) flag++;
    if (rpm_check(release:"SLED11", sp:2, cpu:"x86_64", reference:"MozillaFirefox-branding-SLED-7-0.6.7.80")) flag++;
    if (rpm_check(release:"SLED11", sp:2, cpu:"x86_64", reference:"MozillaFirefox-translations-10.0.7-0.3.1")) flag++;
    if (rpm_check(release:"SLED11", sp:2, cpu:"x86_64", reference:"libfreebl3-3.13.6-0.5.1")) flag++;
    if (rpm_check(release:"SLED11", sp:2, cpu:"x86_64", reference:"libfreebl3-32bit-3.13.6-0.5.1")) flag++;
    if (rpm_check(release:"SLED11", sp:2, cpu:"x86_64", reference:"mozilla-nspr-4.9.2-0.6.1")) flag++;
    if (rpm_check(release:"SLED11", sp:2, cpu:"x86_64", reference:"mozilla-nspr-32bit-4.9.2-0.6.1")) flag++;
    if (rpm_check(release:"SLED11", sp:2, cpu:"x86_64", reference:"mozilla-nss-3.13.6-0.5.1")) flag++;
    if (rpm_check(release:"SLED11", sp:2, cpu:"x86_64", reference:"mozilla-nss-32bit-3.13.6-0.5.1")) flag++;
    if (rpm_check(release:"SLED11", sp:2, cpu:"x86_64", reference:"mozilla-nss-tools-3.13.6-0.5.1")) flag++;
    if (rpm_check(release:"SLES11", sp:2, reference:"MozillaFirefox-10.0.7-0.3.1")) flag++;
    if (rpm_check(release:"SLES11", sp:2, reference:"MozillaFirefox-branding-SLED-7-0.6.7.80")) flag++;
    if (rpm_check(release:"SLES11", sp:2, reference:"MozillaFirefox-translations-10.0.7-0.3.1")) flag++;
    if (rpm_check(release:"SLES11", sp:2, reference:"libfreebl3-3.13.6-0.5.1")) flag++;
    if (rpm_check(release:"SLES11", sp:2, reference:"mozilla-nspr-4.9.2-0.6.1")) flag++;
    if (rpm_check(release:"SLES11", sp:2, reference:"mozilla-nss-3.13.6-0.5.1")) flag++;
    if (rpm_check(release:"SLES11", sp:2, reference:"mozilla-nss-tools-3.13.6-0.5.1")) flag++;
    if (rpm_check(release:"SLES11", sp:2, cpu:"s390x", reference:"libfreebl3-32bit-3.13.6-0.5.1")) flag++;
    if (rpm_check(release:"SLES11", sp:2, cpu:"s390x", reference:"mozilla-nspr-32bit-4.9.2-0.6.1")) flag++;
    if (rpm_check(release:"SLES11", sp:2, cpu:"s390x", reference:"mozilla-nss-32bit-3.13.6-0.5.1")) flag++;
    if (rpm_check(release:"SLES11", sp:2, cpu:"x86_64", reference:"libfreebl3-32bit-3.13.6-0.5.1")) flag++;
    if (rpm_check(release:"SLES11", sp:2, cpu:"x86_64", reference:"mozilla-nspr-32bit-4.9.2-0.6.1")) flag++;
    if (rpm_check(release:"SLES11", sp:2, cpu:"x86_64", reference:"mozilla-nss-32bit-3.13.6-0.5.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 55344 CVE ID: CVE-2012-3979 Firefox是一款非常流行的开源WEB浏览器。 Mozilla Firefox for Android 15.0之前版本没有正确调用函数__android_log_print,在实现上存在远程代码执行漏洞,通过调用JavaScript转储函数的特制网页,攻击者可利用此漏洞在受影响应用中执行任意代码。 0 Mozilla Firefox &lt; 15.0 厂商补丁: Mozilla ------- Mozilla已经为此发布了一个安全公告(mfsa2012-71)以及相应补丁: mfsa2012-71:Insecure use of __android_log_print 链接:http://www.mozilla.org/security/announce/2012/mfsa2012-71.html
idSSV:60364
last seen2017-11-19
modified2012-09-04
published2012-09-04
reporterRoot
titleMozilla Firefox __android_log_print()远程代码执行漏洞